What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2026-0300 Palo Alto Networks PAN-OS…
-
Multiple vulnerabilities in Mozilla products could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-039ISSUE DATE(S):04/28/2026PREVIEW:Several vulnerabilities have been discovered in Mozilla products, the most serious of which could allow the execution of arbitrary code. Mozilla Firefox…
-
CISA adds four known exploited vulnerabilities to its catalog
CISA has added four new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. These types of vulnerabilities are…
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2009-0238 Microsoft Office Remote Code…













